Cybersecurity experts are issuing a critical warning across Latin America as a sophisticated evolution of the JanelaRAT trojan continues to target financial users, with a significant surge in infections reported in Mexico. The malware specifically targets devices running Microsoft Windows, utilizing a combination of deceptive phishing emails and compressed files to gain entry into secure systems.
The threat is not merely a localized glitch but a coordinated campaign targeting the broader financial ecosystem. According to data analyzed by security researchers, the virus has specifically impacted traditional banking institutions, fintech startups, and cryptocurrency platforms, exploiting the digital transition of financial services in the region.
The scale of the infection is substantial. In the previous year, reports indicated 11,695 cases in Mexico and 14,739 cases in Brazil, marking these two nations as primary targets for the operators of this remote access trojan (RAT).
The primary goal of the JanelaRAT variant is the theft of sensitive banking credentials through a process of silent surveillance and active interception. Once installed, the malware monitors the victim’s activity and establishes an interactive communication channel, allowing attackers to exfiltrate data in real-time.
The Mechanics of a Silent Infection
The infection process often begins with a psychological trick known as social engineering. Users may encounter a fraudulent CAPTCHA page—a common security feature used to distinguish humans from bots. However, this version of the attack asks the user to perform an action that no legitimate security service would ever require: opening the “Run” command (Ejecutar) in Windows, pasting a specific string of code, and executing it.
This action bypasses standard security prompts, initiating a silent installation. Because the virus does not trigger traditional alerts, users often remain unaware that their system has been compromised until their financial accounts are accessed by unauthorized parties.
MarÃa Manjarrez, a security researcher at Kaspersky, has highlighted a particularly dangerous capability of the trojan: its ability to detect when a user opens a banking window. At that precise moment, the malware can capture login credentials or deploy a “fake window”—an overlay that looks identical to the user’s legitimate bank portal—to trick them into entering their passwords and security keys directly into the attacker’s database.
Risk Distribution and Impact
While the malware targets Windows users broadly, the impact is concentrated on those utilizing online banking and digital wallets. The versatility of JanelaRAT allows it to pivot between different types of financial assets, making it equally dangerous for a user with a traditional savings account as it is for a high-volume cryptocurrency trader.
| Country | Reported Cases | Primary Targets |
|---|---|---|
| Brazil | 14,739 | Banks, Fintechs, Crypto |
| Mexico | 11,695 | Banks, Fintechs, Crypto |
The danger is compounded by the use of compressed files (such as .zip or .rar) sent via messaging apps or email. These files often hide the malicious executable, which is designed to remain dormant until the user triggers the installation, effectively hiding the threat from basic antivirus scans that only check for known signatures.
How to Identify and Prevent JanelaRAT
Preventing this type of infection requires a shift in how users interact with their operating systems. Security professionals suggest that the most effective defense is a combination of technical configuration and skeptical behavior.

Users are strongly advised to enable the visualization of file extensions in Windows. By doing so, a file that appears to be a simple document may be revealed as a .exe (executable) or .vbs (Visual Basic script) file. These extensions are common markers for malware and should never be opened if they arrive from an unverified source via email or instant messaging.
Beyond technical settings, the following behavioral guidelines are recommended to mitigate the risk of financial data theft:
- Never execute commands: Never copy and paste code into the “Run” or Command Prompt windows at the request of a website or “support” agent.
- Verify CAPTCHAs: Be wary of any CAPTCHA that requires more than clicking a box or typing a few characters.
- Audit Messaging: Treat all unexpected attachments in WhatsApp, Telegram, or email as suspicious, even if they appear to reach from a known contact whose account may have been compromised.
- Use Multi-Factor Authentication (MFA): While the trojan can capture passwords, hardware-based MFA or app-based authenticators provide an additional layer of security that is harder for RATs to bypass.
For those who suspect they have been infected, the immediate priority is to disconnect the device from the internet to sever the interactive channel between the malware and the attacker, followed by a full system scan using reputable security software like Microsoft Defender or third-party professional tools.
Disclaimer: This article is for informational purposes only and does not constitute professional cybersecurity or financial advice.
As cybersecurity firms continue to monitor the evolution of JanelaRAT, the next critical phase will involve the release of updated detection signatures to global antivirus databases to automate the removal of this specific variant. Users are encouraged to keep their operating systems updated to the latest security patches to close the vulnerabilities these trojans exploit.
Do you have experience with these types of alerts or tips on staying secure? Share your thoughts in the comments below.
